Our Blog

RSS

It’s the most wonderful time of the year and if you’re like me, you’re already counting down the days until Christmas. It’s a time to be with friends and family with the added bonus of unwrapping those gifts under your tree. What most…

Read More

Have you ever openly mused to yourself, “I wish that Impact could _________?” What if I told you that it’s actually pretty straight-forward to build new functionality into Core Impact? Oh, so now you’re interested? Awesome. Over the next couple of blogs, I’m…

Read More

Did you know that, on average, 15 million residents in the U.S. are affected by identity theft and upwards of $50 billion are stolen1 each year?During the holiday season we hear a lot about keeping your identity safe when shopping online or in…

Read More

We’re releasing the new version of Core Impact shortly, with some exciting new features. I can’t speak for anyone but myself but the single most exciting new feature in Impact 2017 is our new ability to launch Powershell natively on target systems. PowerShell…

Read More

 
I started this research trying to simplify the techniques used during a WIFI pen-test. The idea was to play with WIWO,  a tool released by Core Security last year, in order to make a transparent channel between a network interface located in…

Read More

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s the time for retailers to shine. It’s also the time where retailers are most vulnerable to security risks as bad actors gear up…

Read More

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s a time for retailers to shine. But, it’s also the time where retailers are most vulnerable to security risks as bad actors gear…

Read More

What once was only science fiction is now our reality, anything and everything can be hacked. For healthcare providers, ‘anything’ includes not only patient records and claims information, but sentient things like drug pumps and pacemakers. In addition, healthcare has operational functionality that…

Read More

As cyber-security around devices, networks, and more continues to diversify, multiply, and experience an increase in the number of breaches, small to mid-sized businesses have to ask themselves if they are properly equipped in-house to handle the necessary protocols to protect their data.…

Read More

We are excited to announce that Core Vulnerability Insight 5.5 is now available for general release!

Core Vulnerability Insight is meant to enhance your vulnerability management process. Massive amounts of vulnerabilities are generated as a result of both network and web scanning activities at…

Read More